Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Personal Information Protection Law (PIPL) Compliance Checklist

Published November 1, 2023
Author

Omer Imran Malik

Data Privacy Legal Manager, Securiti

FIP, CIPT, CIPM, CIPP/US

Listen to the content

This post is also available in: Brazilian Portuguese

China has passed its data protection law named the Personal Information Protection Law (PIPL) that came into effect on November 1, 2021. The PIPL is comparatively more strict than other privacy laws. However, it does have several similarities to the GDPR.

PIPL is going to have a great impact on organizations because of its extraterritorial application, strict compliance requirements, and hefty fines. Most of the organizations already have privacy policies and effective privacy management practices in place to ensure compliance with the GDPR. However, these existing policies won’t be fully able to address the compliance requirements required under the PIPL. Organizations should begin reviewing their policies and practices in preparation for complying with the PIPL (effective from November 1st, 2021). We  have compiled a checklist of key requirements under China’s PIPL:

1. Identify whether your organization needs to have a dedicated entity or a representative within the borders of China:

China’s PIPL extends its territorial scope to the processing of personal information conducted outside of China, provided that the purpose of the processing is:

(i)   To provide products or services to individuals in China, or
(ii)  To “analyze” or “assess" the behavior of individuals in China, or
(iii) For other purposes to be specified by laws and regulations.

So if you are an offshore organization that is processing the personal data of Chinese residents for the purpose of providing services or products, or for analyzing and assessing their behavior, you must establish a “dedicated office” or appoint a “designated representative” in China for personal information protection purposes, and also file the information of the entity or the representative with competent government authorities.

2. Identify the lawful basis for collection and use of all personal information:

Under the PIPL, organizations can process personal information only on a lawful basis. PIPL provides seven lawful basis for the processing of personal information. Please find these lawful basis here and ensure that your organization relies on one of these basis for the processing of personal information. Your organization’s processing activities should have a clear and reasonable purpose and shall be directly related to the processing purpose. Please note that, unlike the GDPR,  “legitimate interest” is not a recognized lawful basis under the PIPL.

3. Provide individuals the right to withdraw their consent to the processing of their personal information:

Where your organization relies on consent as a lawful basis of processing, you must provide a convenient mechanism for individuals to withdraw their consent. You should not refuse to provide services to individuals who don’t agree to have their data processed, unless that data is necessary for the provision of that product or service.

4. Provide privacy notices to individuals before the processing activities:

PIPL requires organizations to provide an explicit privacy notice to individuals in a clear and easily understood language before the processing of their personal information. Your privacy notice should include the following information:

  • The name or personal name and contact method of the data controller;
  • The purpose of personal information processing and the processing methods, the categories of processed personal information, and the retention period;
  • Methods and procedures for individuals to exercise the rights provided in the PIPL;
  • Other items that laws or administrative regulations provide shall be notified.

If your organization notifies individuals through the method of formulating personal information processing rules, then you should make these processing rules public and convenient to read and store.

5. Have data subject requests mechanisms to fulfill data subjects rights:

PIPL provides individuals with several data subjects rights (i.e, access, rectification, limit, deletion, etc.), and mandates that organizations should establish convenient mechanisms to accept and process requests from individuals to exercise their rights. Therefore, your organization should have an automated data subject requests mechanism.

6. Have a security breach response and notification mechanism in place:

PIPL requires that in the event of a security breach, organizations should take “immediate” remediation actions and notify the relevant agencies and affected individuals. You should have a clear security breach response plan and tools in place to ensure compliance with the breach notifications.

7. Assess the need to conduct a Personal Information Impact Assessment:

Your organization must conduct a Personal Information Impact Assessment if you are conducting processing in one of the following scenarios:

  • Processing sensitive personal information; or
  • Using personal information to conduct automated decision-making; or
  • Entrusting personal information processing, or providing personal information to other data controllers, or disclosing personal information; or
  • Providing personal information abroad; or
  • Other personal information processing activities with a major impact on individuals.

8. Implement data classifications and management mechanisms:

Under the PIPL, organizations are required to formulate internal management structures and operating rules and implement data classification and management mechanisms. This requirement aligns with the new data classification obligations under China’s Data Security Law. Therefore, your organization should have data classification and management mechanisms in place in accordance with categories of personal information that you process.

9. Fulfill cross border data transfer obligations:

If your organization is involved in cross-border data transfers with China, you must oblige with these strict requirements. You must provide notices to individuals explaining the details of the transfer, and obtain their specific consent for the transfer of their personal information. You must also meet one of the following conditions:

  1. Pass a security assessment organized by the State cybersecurity and informatization department (related to operators of Critical Information Infrastructure and organizations that transfer a large volume of personal information);
  2. Undergo a personal information protection certification conducted by a specialized body according to provisions by the State cybersecurity and informatization department;
  3. Conclude a contract with the foreign receiving side in accordance with a standard contract formulated by the cyberspace and informatization department, agreeing upon the rights and responsibilities of both sides;
  4. Other conditions are provided in laws or administrative regulations or by the State cybersecurity and informatization department.

If you process a large volume of personal information or categorize yourself as a critical information infrastructure operator, then you must fulfill the data localization requirements of the PIPL.

10. Conclude data processing agreements with third parties processors:

If you are engaging third parties for your processing activities, you must ensure that you conclude an agreement with the third parties on the purpose for processing, the time limit, the processing method, categories of personal information, protection measures, as well as the rights and duties of both sides, etc., and conduct supervision of the personal information processing activities of the third parties.

Securiti helps organizations automate their privacy management operations using artificial intelligence and robotic automation. Request a demo and start your PIPL compliance process today.


Frequently Asked Questions (FAQs)

The Personal Information Protection Law (PIPL) in China requires organizations to obtain consent for data processing, implement security measures, appoint a Data Protection Officer (DPO), and follow specific rules for cross-border data transfers, among other compliance requirements.

PIPL and GDPR are data protection regulations, but they differ in scope, definitions, and specific requirements. For example, PIPL applies to the processing of personal information in China, while GDPR covers the European Union.

Personal information under PIPL includes names, identification numbers, contact information, biometric data, health information, and any data that can be used to identify an individual.

Yes, the PIPL requires certain organizations to appoint a Data Protection Officer (DPO) responsible for overseeing data protection compliance and acting as a point of contact for data subjects and authorities.

Personal information refers to various information related to an identified or identifiable natural person recorded electronically or by other means, but does not include anonymized information.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Take a
Product Tour

See how easy it is to manage privacy compliance with robotic automation.

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 13:38

Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines

Sanofi Thumbnail
Watch Now View
Spotlight 10:35

There’s Been a Material Shift in the Data Center of Gravity

Watch Now View
Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View

Latest

AI System Observability: Go Beyond Model Governance View More

AI System Observability: Go Beyond Model Governance

Across industries, AI systems are no longer just tools acting on human prompts. The AI landscape is evolving rapidly, and AI systems are gaining...

View More

Securiti Accelerates Secure Agentic AI Deployments with NVIDIA Enterprise AI Factory

Still adapting to  the initial Gen AI boom, the IT industry is now undergoing another profound evolution- the rise of Agentic AI. AI has...

Enterprise Data Security View More

What is Enterprise Data Security?

Get comprehensive insights into enterprise data security, what it is, its importance, key components, and how Securiti helps ensure the utmost enterprise data security.

Cloud Security Posture Management View More

What is Cloud Security Posture Management (CSPM)?

Learn the importance of CSPM for modern enterprises, the core capabilities to consider, and clears several misconceptions related to it.

Mastering Cookie Consent: Global Compliance & Customer Trust View More

Mastering Cookie Consent: Global Compliance & Customer Trust

Discover how to master cookie consent with strategies for global compliance and building customer trust while aligning with key data privacy regulations.

Why Data Access Is Your Weakest Link—And How DSPM Fixes It View More

Why Data Access Is Your Weakest Link—And How DSPM Fixes It

Learn how DSPM provides unified Data+AI Access governance, offering contextual data intelligence, automated controls, safe AI+data access, and consistent least-privilege enforcement.

The European Health Data Space Regulation View More

The European Health Data Space Regulation: A Legislative Timeline and Implementation Roadmap

Download the infographic on the European Health Data Space Regulation, which features a clear timeline and roadmap highlighting key legislative milestones, implementation phases, and...

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New